C:\Users\Domin\source\repos\Hydrox\Hydrox\obj\Debug\Hydrox.pdb
Static task
static1
General
-
Target
Hydrox.exe
-
Size
53KB
-
MD5
4c1412dd7a652cab42eddc0f5ad40481
-
SHA1
87c3b402ebde470cbdc23d7f02557cccc8266cc3
-
SHA256
eac3da5445657fcc4e86d8912eeb4481654fb307a057d74c121d258c4335d799
-
SHA512
439020d7bb79d70818a89a78fee75f13e0bd3b4808d7ef11df6d394be90772205dbd38fa74869ff8592f025b845565e918e38d86311fedb607fecfbd7feb3057
-
SSDEEP
768:vIKreLkaLvjBQc2cBjF5Yt7nRWd7wNOZ3GBDIqDtZl2m+o1I0Ivkyp/ZqV1XoLhF:DsdQcTxKchwsgVvU0IvkwhC1EF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hydrox.exe
Files
-
Hydrox.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ